Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Security, Cloud Infrastructure, Cloud Platforms, Cloud Computing, Cloud Storage, Infrastructure As A Service (IaaS), Emerging Technologies, Hybrid Cloud Computing, IBM Cloud, Serverless Computing, Virtualization, Microservices, Containerization
Skills you'll gain: Networking Hardware, TCP/IP, Network Security, Network Protocols, Endpoint Detection and Response, Network Routing, Cybersecurity, Network Architecture, Local Area Networks, Dynamic Host Configuration Protocol (DHCP), Firewall, General Networking, Intrusion Detection and Prevention, Cyber Threat Intelligence, Computer Networking, Network Planning And Design, Wireless Networks, Security Information and Event Management (SIEM), Network Analysis, Data Loss Prevention
- Status: AI skills
Microsoft
Skills you'll gain: Data Storytelling, Dashboard, Excel Formulas, Extract, Transform, Load, Power BI, Data Analysis Expressions (DAX), Microsoft Excel, Data Modeling, Data-Driven Decision-Making, Star Schema, Data Analysis, Data Presentation, Data Visualization Software, Microsoft Power Platform, Data Integrity, Spreadsheet Software, Data Validation, Data Transformation, Data Cleansing, Data Visualization
Skills you'll gain: Agile Software Development, Cloud Computing Architecture, Cloud Services, Agile Methodology, DevOps, Kanban Principles, Cloud Security, Cloud Infrastructure, Cloud Platforms, Cloud Computing, Agile Project Management, Cloud-Native Computing, User Story, Cloud Storage, Sprint Retrospectives, Sprint Planning, Workflow Management, CI/CD, Test Driven Development (TDD), Scrum (Software Development)
- Status: Free
Erasmus University Rotterdam
Skills you'll gain: Security Management, Threat Management, Intelligence Collection and Analysis, International Relations, Public Safety and National Security, Security Awareness, Risk Management, Threat Detection, Governance, Law, Regulation, and Compliance, Innovation, Policy Development
- Status: New AI skills
Google
Skills you'll gain: Computer Networking, Package and Software Management, Network Security, Network Troubleshooting, Systems Administration, Cloud Infrastructure, IT Infrastructure, TCP/IP, File Systems, Microsoft Windows, Network Architecture, Routing Protocols, Desktop Support, Lightweight Directory Access Protocols, Cybersecurity, Encryption, Security Awareness, Computer Hardware, Technical Support, Software Installation
Skills you'll gain: Istio, Open Web Application Security Project (OWASP), Software Development Life Cycle, Linux Commands, Unit Testing, Object-Relational Mapping, Application Deployment, NoSQL, Kubernetes, Bash (Scripting Language), MongoDB, Shell Script, OpenShift, Git (Version Control System), Cloud Applications, Containerization, GitHub, Serverless Computing, Jupyter, Grafana
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Cloud Security, Cloud Infrastructure, Data Mining, Cloud Platforms, Cloud Computing, Artificial Intelligence, Generative AI, Data Ethics, Cloud Storage, Artificial Intelligence and Machine Learning (AI/ML), Infrastructure As A Service (IaaS), Big Data, Emerging Technologies, Data Analysis, Data Science, Deep Learning, Digital Transformation, Artificial Neural Networks
University of Virginia Darden School Foundation
Skills you'll gain: Strategic Thinking, Digital Transformation, Business Strategy, Cloud Computing Architecture, Competitive Analysis, Cloud Services, Business Transformation, Cloud Security, Cloud Infrastructure, Big Data, Cloud Platforms, Data Analysis, Statistical Analysis, Cloud Computing, Artificial Intelligence, Generative AI, Data Ethics, Apache Hadoop, Product Lifecycle Management, Business Technologies
Skills you'll gain: Cybersecurity, Encryption, Cyber Attacks, Email Security, Computer Security Awareness Training, Security Awareness, Data Security, Information Systems Security, Malware Protection, Authentications, Authorization (Computing), Security Controls, Hardening, Identity and Access Management, Multi-Factor Authentication, Browser Compatibility
Skills you'll gain: CI/CD, Istio, Open Web Application Security Project (OWASP), Continuous Integration, Software Development Life Cycle, Linux Commands, Agile Software Development, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Jenkins, Kubernetes, Bash (Scripting Language), Cloud Services, Git (Version Control System), DevOps, Jupyter, Grafana
In summary, here are 10 of our most popular breach (security exploit) courses
- Introduction to Cloud Computing:Â IBM
- Computer Networks and Network Security:Â IBM
- Microsoft Power BI Data Analyst:Â Microsoft
- DevOps, Cloud, and Agile Foundations:Â IBM
- International Security Management:Â Erasmus University Rotterdam
- Google IT Support:Â Google
- IBM Back-End Development:Â IBM
- Introduction to Cyber Security:Â New York University
- Key Technologies for Business:Â IBM
- IBM & Darden Digital Strategy:Â University of Virginia Darden School Foundation